Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Releases

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

 Releases

 Documents

All Releases
 Protego - 7 September, 2017
 Angelfire - 31 August, 2017
 ExpressLane - 24 August, 2017
 CouchPotato - 10 August, 2017
 Dumbo - 3 August, 2017
 Imperial - 27 July, 2017
 UCL / Raytheon - 19 July, 2017
 Highrise - 13 July, 2017
 BothanSpy - 6 July, 2017
 OutlawCountry - 30 June, 2017
 Elsa - 28 June, 2017
 Brutal Kangaroo - 22 June, 2017
 Cherry Blossom - 15 June, 2017
 Pandemic - 1 June, 2017
 Athena - 19 May, 2017
 AfterMidnight - 12 May, 2017
 Archimedes - 5 May, 2017
 Scribbles - 28 April, 2017
 Weeping Angel - 21 April, 2017
 Hive - 14 April, 2017
 Grasshopper - 7 April, 2017
 Marble Framework - 31 March, 2017
 Dark Matter - 23 March, 2017

Protego
7 September, 2017

Today, September 7th 2017, WikiLeaks publishes four secret documents from
the Protego project of the CIA, along with 37 related documents (proprietary
hardware/software manuals from Microchip Technology Inc.). The project was
maintained between 2014 and 2015.

Protego is not the "usual" malware development project like all previous publications
by WikiLeaks in the Vault7 series. Indeed there is no explicit indication why it is part of
the project repositories of the CIA/EDG at all.

The Protego project is a PIC-based missile control system that was developed
by Raytheon. The documents indicate that the system is installed on-board a Pratt &
Whitney aircraft (PWA) equipped with missile launch systems (air-to-air and/or air-to-
ground).

Protego consists of separate micro-controller units that exchange data and signals over
encrypted and authenticated channels:

» On-board TWA are the 'Master Processor' (MP) and the 'Deployment Box'. Both
systems are layed-out with master/slave redundancy.

» The missle system has micro-controllers for the missle itself ('Missle Smart Switch',
MSS), the tube ('Tube Smart Switch', TSS) and the collar (which holds the missile
before and at launch time).

The MP unit receives three signals from a beacon: 'In Border' (PWA is within the
defined area of an operation), 'Valid GPS' (GPS signal available) and 'No End of
Operational Period' (current time is within the defined timeframe for an operation).
Missiles can only be launched if all signals received by MP are set to 'true'. Similary
safeguards are in place to auto-destruct encryption and authentication keys for various
scenarios (like 'leaving a target area of operation' or 'missing missle').

Leaked Documents
Protego Release 01.05 -- System HW Description

Protego Release 01.05 -- Build Procedure

Protego Release 01.05 -- Message Format

Protego Release 01.05 -- SW SCRs

Angelfire
31 August, 2017
Today, August 31st 2017, WikiLeaks publishes documents from the Angelfire project of
the CIA. Angelfire is an implant comprised of five components: Solartime, Wolfcreek,
Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system.
Like previously published CIA projects (Grasshopper and AfterMidnight) in
the Vault7 series, it is a persistent framework that can load and execute custom implants
on target computers running the Microsoft Windows operating system (XP or Win7).

Solartime modifies the partition boot sector so that when Windows loads boot time
device drivers, it also loads and executes the Wolfcreek implant, that once executed, can
load and run other Angelfire implants. According to the documents, the loading of
additional implants creates memory leaks that can be possibly detected on infected
machines.

Keystone is part of the Wolfcreek implant and responsible for starting malicious user
applications. Loaded implants never touch the file system, so there is very little forensic
evidence that the process was ever ran. It always disguises as
"C:\Windows\system32\svchost.exe" and can thus be detected in the Windows task
manager, if the operating system is installed on another partition or in a different path.

BadMFS is a library that implements a covert file system that is created at the end of the
active partition (or in a file on disk in later versions). It is used to store all drivers and
implants that Wolfcreek will start. All files are both encrypted and obfuscated to avoid
string or PE header scanning. Some versions of BadMFS can be detected because the
reference to the covert file system is stored in a file named "zf".

The Windows Transitory File system is the new method of installing AngelFire. Rather
than lay independent components on disk, the system allows an operator to create
transitory files for specific actions including installation, adding files to AngelFire,
removing files from AngelFire, etc. Transitory files are added to the 'UserInstallApp'.

Leaked Documents
Angelfire 2.0 -- User Guide

BadMFS -- Developer Guide

Wolfcreek Docs -- Angelfire User Guide

Wolfcreek Docs -- Angelfire Test Matrix

Wolfcreek Docs -- Notes

See more
ExpressLane
24 August, 2017

Today, August 24th 2017, WikiLeaks publishes secret documents from


the ExpressLane project of the CIA. These documents show one of the cyber operations
the CIA conducts against liaison services -- which includes among many others the
National Security Agency (NSA), the Department of Homeland Security (DHS) and the
Federal Bureau of Investigation (FBI).

The OTS (Office of Technical Services), a branch within the CIA, has a biometric
collection system that is provided to liaison services around the world -- with the
expectation for sharing of the biometric takes collected on the systems. But this
'voluntary sharing' obviously does not work or is considered insufficient by the CIA,
because ExpressLane is a covert information collection tool that is used by the CIA to
secretly exfiltrate data collections from such systems provided to liaison services.

ExpressLane is installed and run with the cover of upgrading the biometric software by
OTS agents that visit the liaison sites. Liaison officers overseeing this procedure will
remain unsuspicious, as the data exfiltration disguises behind a Windows installation
splash screen.

The core components of the OTS system are based on products from Cross Match, a US
company specializing in biometric software for law enforcement and the Intelligence
Community. The company hit the headlines in 2011 when it was reported that the US
military used a Cross Match product to identify Osama bin Laden during the
assassination operation in Pakistan.

Leaked Documents
ExpressLane v3.1.1 -- Tool Delivery Review

ExpressLane v3.1.1 -- TPP FINAL

ExpressLane v3.1.1 -- User Manual

ExpressLane v3.1.1 -- Requirement Statement

ExpressLane v3.0 -- User Guide

See more
CouchPotato
10 August, 2017

Today, August 10th 2017, WikiLeaks publishes the the User Guide for
the CoachPotato project of the CIA. CouchPotato is a remote tool for collection against
RTSP/H.264 video streams. It provides the ability to collect either the stream as a video
file (AVI) or capture still images (JPG) of frames from the stream that are of significant
change from a previously captured frame. It utilizes ffmpeg for video and image
encoding and decoding as well as RTSP connectivity. CouchPotato relies on being
launched in an ICE v3 Fire and Collect compatible loader.

Leaked Documents
CouchPotato v1.0 -- User Guide

Dumbo
3 August, 2017

Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of
the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any
video recordings that could compromise a PAG deployment. The PAG (Physical Access
Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to
gain and exploit physical access to target computers in CIA field operations.

Dumbo can identify, control and manipulate monitoring and detection systems on a
target computer running the Microsoft Windows operating sytem. It identifies installed
devices like webcams and microphones, either locally or connected by wireless
(Bluetooth, WiFi) or wired networks. All processes related to the detected devices
(usually recording, monitoring or detection of video/audio/network streams) are also
identified and can be stopped by the operator. By deleting or manipulating recordings
the operator is aided in creating fake or destroying actual evidence of the intrusion
operation.

Dumbo is run by the field agent directly from an USB stick; it requires administrator
privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and
newer versions of Windows operating system. 64bit Windows XP, or Windows versions
prior to XP are not supported.

Leaked Documents
Dumbo v3.0 -- Field Guide
Dumbo v3.0 -- User Guide

Dumbo v2.0 -- Field Guide

Dumbo v2.0 -- User Guide

Dumbo v1.0 -- TDR Briefing

See more

Imperial
27 July, 2017

Today, July 27th 2017, WikiLeaks publishes documents from the Imperial project of
the CIA.

Achilles is a capability that provides an operator the ability to trojan an OS X disk


image (.dmg) installer with one or more desired operator specified executables for a
one-time execution.

Aeris is an automated implant written in C that supports a number of POSIX-based


systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file
exfiltration, configurable beacon interval and jitter, standalone and Collide-based
HTTPS LP support and SMTP protocol support - all with TLS encrypted
communications with mutual authentication. It is compatible with the NOD
Cryptographic Specification and provides structured command and control that is
similar to that used by several Windows implants.

SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities. It hides
files/directories, socket connections and/or processes. It runs on Mac OSX 10.6 and
10.7.

Leaked Documents
Achilles -- User Guide

SeaPea -- User Guide

Aeris -- Users Guide


UCL / Raytheon
19 July, 2017

Today, July 19th 2017, WikiLeaks publishes documents from the CIA
contractor Raytheon Blackbird Technologies for the "UMBRAGE Component Library"
(UCL) project. The documents were submitted to the CIA between November 21st,
2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber
Powerhouse) and September 11th, 2015. They mostly contain Proof-of-Concept ideas
and assessments for malware attack vectors - partly based on public documents from
security researchers and private enterprises in the computer security field.

Raytheon Blackbird Technologies acted as a kind of "technology scout" for the Remote
Development Branch (RDB) of the CIA by analysing malware attacks in the wild and
giving recommendations to the CIA development teams for further investigation and
PoC development for their own malware projects.

Leaked Documents
(S//NF) CSIT 15083 -- HTTPBrowser

(S//NF) CSIT 15085 -- NfLog

(S//NF) Symantec -- Regin - Stealthy Surveillance

(S//NF) FireEye -- HammerToss - Stealthy Tactics

(S//NF) VB -- Gamker

See more

Highrise
13 July, 2017

Today, July 13th 2017, WikiLeaks publishes documents from the Highrise project of
the CIA. HighRise is an Android application designed for mobile devices running
Android 4.0 to 4.3. It provides a redirector function for SMS messaging that could be
used by a number of IOC tools that use SMS messages for communication between
implants and listening posts. HighRise acts as a SMS proxy that provides greater
separation between devices in the field ("targets") and the listening post (LP) by
proxying "incoming" and "outgoing" SMS messages to an internet
LP. Highrise provides a communications channel between the HighRise field operator
and the LP with a TLS/SSL secured internet communication.

Leaked Documents
HighRise 2.0 Users Guide

BothanSpy
6 July, 2017

Today, July 6th 2017, WikiLeaks publishes documents from


the BothanSpy and Gyrfalcon projects of the CIA. The implants described in both
projects are designed to intercept and exfiltrate SSH credentials but work on different
operating systems with different attack vectors.

BothanSpy is an implant that targets the SSH client program Xshell on the Microsoft
Windows platform and steals user credentials for all active SSH sessions. These
credentials are either username and password in case of password-authenticated SSH
sessions or username, filename of private SSH key and key password if public key
authentication is used. BothanSpy can exfiltrate the stolen credentials to a CIA-
controlled server (so the implant never touches the disk on the target system) or save it
in an enrypted file for later exfiltration by other means. BothanSpy is installed as a
Shellterm 3.x extension on the target machine.

Gyrfalcon is an implant that targets the OpenSSH client on Linux platforms


(centos,debian,rhel,suse,ubuntu). The implant can not only steal user credentials of
active SSH sessions, but is also capable of collecting full or partial OpenSSH session
traffic. All collected information is stored in an encrypted file for later exfiltration. It is
installed and configured by using a CIA-developed root kit (JQC/KitV) on the target
machine.

Leaked Documents
BothanSpy 1.0

Gyrfalcon 2.0 User Guide

Gyrfalcon 1.0 User Manual


OutlawCountry
30 June, 2017

Today, June 30th 2017, WikiLeaks publishes documents from


the OutlawCountry project of the CIA that targets computers running the Linux
operating system. OutlawCountry allows for the redirection of all outbound network
traffic on the target computer to CIA controlled machines for ex- and infiltration
purposes. The malware consists of a kernel module that creates a hidden netfilter table
on a Linux target; with knowledge of the table name, an operator can create rules that
take precedence over existing netfilter/iptables rules and are concealed from an user or
even system administrator.

The installation and persistence method of the malware is not described in detail in the
document; an operator will have to rely on the available CIA exploits and backdoors to
inject the kernel module into a target operating system. OutlawCountry v1.0 contains
one kernel module for 64-bit CentOS/RHEL 6.x; this module will only work with
default kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT rules to
the PREROUTING chain.

Leaked Documents
OutlawCountry v1.0 User Manual

OutlawCountry v1.0 Test Plan

Elsa
28 June, 2017

Today, June 28th 2017, WikiLeaks publishes documents from the ELSA project of the
CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the
Micorosoft Windows operating system. Once persistently installed on a target machine
using separate CIA exploits, the malware scans visible WiFi access points and records
the ESS identifier, MAC address and signal strength at regular intervals. To perform the
data collection the target machine does not have to be online or connected to an access
point; it only needs to be running with an enabled WiFi device. If it is connected to the
internet, the malware automatically tries to use public geo-location databases from
Google or Microsoft to resolve the position of the device and stores the longitude and
latitude data along with the timestamp. The collected access point/geo-location
information is stored in encrypted form on the device for later exfiltration. The malware
itself does not beacon this data to a CIA back-end; instead the operator must actively
retrieve the log file from the device - again using separate CIA exploits and backdoors.
The ELSA project allows the customization of the implant to match the target
environment and operational objectives like sampling interval, maximum size of the
logfile and invocation/persistence method. Additional back-end software (again using
public geo-location databases from Google and Microsoft) converts unprocessed access
point information from exfiltrated logfiles to geo-location data to create a tracking
profile of the target device.

Leaked Documents
ELSA User Manual

Brutal Kangaroo
22 June, 2017

Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal
Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows
that targets closed networks by air gap jumping using thumbdrives. Brutal
Kangaroo components create a custom covert network within the target closed network
and providing functionality for executing surveys, directory listings, and arbitrary
executables.

The documents describe how a CIA operation can infiltrate a closed network (or a
single air-gapped computer) within an organization or enterprise without direct access.
It first infects a Internet-connected computer within the organization (referred to as
"primary host") and installs the BrutalKangeroo malware on it. When a user is using the
primary host and inserts a USB stick into it, the thumbdrive itself is infected with a
separate malware. If this thumbdrive is used to copy data between the closed network
and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on
the closed network. By browsing the USB drive with Windows Explorer on such a
protected computer, it also gets infected with exfiltration/survey malware. If multiple
computers on the closed network are under CIA control, they form a covert network to
coordinate tasks and data exchange. Although not explicitly stated in the documents,
this method of compromising closed networks is very similar to how Stuxnet worked.

The Brutal Kangaroo project consists of the following components: Drifting


Deadline is the thumbdrive infection tool, Shattered Assurance is a server tool that
handles automated infection of thumbdrives (as the primary mode of propagation for
the Brutal Kangaroo suite), Broken Promise is the Brutal Kangaroo postprocessor (to
evaluate collected information) and Shadow is the primary persistence mechanism (a
stage 2 tool that is distributed across a closed network and acts as a covert command-
and-control network; once multiple Shadow instances are installed and share drives,
tasking and payloads can be sent back-and-forth).

The primary execution vector used by infected thumbdrives is a vulnerability in the


Microsoft Windows operating system that can be exploited by hand-crafted link files
that load and execute programs (DLLs) without user interaction. Older versions of the
tool suite used a mechanism called EZCheese that was a 0-day exploit until March
2015; newer versions seem use a similar, but y

You might also like